Login / Signup

Lossless Steganography Techniques for IP Telephony Speech Taking Account of the Redundancy of Folded Binary Code.

Naofumi Aoki
Published in: NCM (2009)
Keyphrases
  • binary codes
  • data embedding
  • hamming distance
  • speech recognition
  • gray code
  • similarity search
  • speech signal
  • data sets
  • hash functions
  • pattern recognition
  • lossless compression
  • secret data